<JC> ... there are lots of
things that repeat, though there are slight nuances

<JC> ... the point is to make
people think about the questions

<yrlesru> - Data flow
analysis so you understand the data flowing between trusted
control points and external interactors, classification of data
so that personal data identified and which of that PD is
"identifiable", "linkable", "observable",

<JC> ... we need to make the
assessment again and again

<yrlesru> - Then understand
where threats are against identified privacy principles,

<yrlesru> - Mitigation of
threats,

<JC> Tara: Nick
fingerprining?

<yrlesru> YES, Kiitos Tara,
will take comments to mailing list...

<JC> Npdoty: We should move
this to next call.

<yrlesru> - Lastly,
mitigation to threats.

<JC> ... One thing that was
mentioned was that the TAG provides high-level architecture
guidance for the group